SEARCH CLINIC

Search engine online marketers
Subscribe Twitter Facebook Linkedin

Samsung loses market dominance as competition hots up

October 30, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Customer Service, Dr Search, Mobile Marketing, mobile phones, Samsung, Telecommunications Companies, Uncategorized

Samsung smartphones are struggling to “wow” consumers with new phones- leading to slowing sales.

Samsung loses market dominance as competition hots up

This week, the world’s largest smartphone maker said its third-quarter operating profit fell 60% from a year earlier to £2.5 billion, marking its weakest quarterly profit since 2011. Sales also tumbled 20% in the same period.

News of Samsung’s worsening condition come even as the tech giant maintains a stronghold on the global smartphone market – accounting for 25% of it in the second quarter of this year, according to technology research firm IDC. But, that’s down from 32% a year earlier.

With the mobile business making up 70% of its operating profit, Samsung has launched several products recently to try to stay ahead of its rivals, such as the latest version of its flagship smartphone Galaxy S5 in April, while being the first to launch the latest tech trend – the smartwatch – last year.

It also rushed the release of the newest editions of its larger screen Galaxy Notes – the Galaxy Note 4 and the Galaxy Note Edge – ahead of schedule in September to face off against demand for Apple’s larger screen iPhones.

But stiff competition from the likes of Apple in the premium end, and cheaper smartphones from Chinese rivals such as Xiaomi and Lenovo in the lower end, is making it more difficult for Samsung to see growth.

Analysts say Samsung will continue to lose market share unless it can figure out a way to once again “wow” consumers that no longer appear to be impressed by its massive line-up of products.

Fast-growing Chinese budget smartphone maker Xiaomi announced this year that it was planning to double the number of handsets sold in 2014 from a year ago to 60 million, which is the same amount that Samsung sold in China last year.

That has not helped Samsung’s case, especially when added to the delayed launch of Samsung’s long-awaited Tizen operating system, which would have reduced its reliance on Google’s Android system for its phones.

While analysts agree that it is too early to call the end of Samsung’s reign at the top of the market with still such a sizeable gap between it and its closest competitor Apple at 12% market share, they believe that Samsung’s current growth rate is not sustainable.

The double-digit growth last year that propelled Samsung’s mobile phone revenue to overtake its television revenue, will no longer happen in a saturated smartphone market.

But in order to stay on top of the market,  Samsung needs to figure out how to better integrate its devices and add services on top of its phones to add value for consumers.

Samsung needs to narrow its focus from being a mass producer of phones in every segment to concentrate on areas where there is consumer growth, such as the lower end of the market.

Samsung’s future plans to reignite sales growth do seem to be heading in the direction of the lower end of the market.

In its earnings release on Thursday, the tech giant said it expects demand to grow for its new “middle-end smartphone models” but that may “require a potential increase in marketing expenses associated with year-end promotion” to keep up with the competition.

But Samsung’s earnings may also take a hit in the long term from this move- once you move to the mid-range segment, you look at the profit margin, and you probably have to sell two or three phones to equal the flagship model revenue that you can get.

Met Office to build £97 million supercomputer

October 30, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Cloud Computing, Computers, Customer Service, Dr Search, Search Clinic, Technology Companies, Uncategorized

The Met Office have been given £97 million to build a supercomputer to improve their weather forecasting and climate modelling.

Met Office to build £97 million supercomputerThe facility will work 13 times faster than the current system- enabling detailed UK wide forecast models with a resolution of 1.5 km to be run every single hour, rather than every three.

It will be built in Exeter during 2015 and become operational next September.

The Met Office said it would deliver a “step change” in forecast accuracy. It will allow us to add more precision, more detail, more accuracy to our forecasts on all time scales for tomorrow, for the next day, next week, next month and even the next century,” said Met Office chief executive Rob Varley.

As well as running UK-wide and global forecasting models more frequently, the new technology will allow particularly important areas to receive much more detailed assessment.

For example, forecasts of wind speeds, fog and snow showers could be delivered for major airports, with a spatial resolution of 300m.

The extra capacity will also be useful for climate scientists, who need massive amounts of computing power to run detailed models over much longer time scales.

It will address one of the key challenges of climate projections – to “answer the real questions people need to know”, said Mr Varley. “We can tell you that the global average temperature is going to increase by 3C or 4C if we carry on as we are – but the critical question is what is that going to mean for London?

But because the weather matters so much – to everything from whether to leave home with a brolly to preparing for closed runways at an airport – all eyes are on the Met Office, and the glances are not often positive.

The biggest failures have now entered the national vocabulary: Michael Fish’s denial of an approaching hurricane in 1987 and the infamous suggestion of a “barbecue summer” in 2009 when the reality proved relentlessly soggy.

The Met Office asserts that people never notice everyday successes, a gradual increase in reliability that has seen each decade allow the forecasts to reach another day into the future.

The new supercomputer should accelerate that process, crunching bigger numbers at a finer scale and more frequently than ever before. But it may also raise expectations about accuracy. And, in a country obsessed with the weather, that brings its own risks.

Mr Varley said he was “absolutely delighted” the government had confirmed its investment, which was first promised by the chancellor in the 2013 Autumn Statement.

The new system will be housed partly at the Met Office headquarters in Exeter and partly at a new facility in the Exeter Science Park, and will reach its full capacity in 2017.

At that point, its processing power will be 16 petaflops – meaning it can perform 16 quadrillion calculations every second.

The “Cray XC40″ machine will have 480,000 central processing units or CPUs, which is 12 times as many as the current Met Office supercomputer, made by IBM. At 140 tonnes, it will also be three times heavier.

It marks the biggest contract the Cray supercomputing firm has secured outside the US.

“It will be one of the best high-performance computers in the world,” Science Minister Greg Clark told journalists at the announcement, adding that it would “transform the analytical capacity of the Met Office”.

Mr Clark said the supercomputer would put the UK, appropriately, at the forefront of weather and climate science. “It makes us world leaders not only in talking about the weather, but forecasting it too.”

The improved forecasts, according to the Met Office, could deliver an estimated £2 billion in socio-economic benefits, including more advance warning of floods, less air travel disruption, more secure decision-making for renewable energy investments, and efficient planning for the impacts of climate change.

Queen Elizabeth sends first Tweet

October 24, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Computers, Dr Search, internet, Search Clinic, Technology Companies, Telecommunications Companies, Twitter, Uncategorized

The Queen has sent her first tweet to launch the Science Museum gallery.

Queen Elizabeth sends first Tweet“It is a pleasure to open the Information Age exhibition today at the @ScienceMuseum and I hope people will enjoy visiting. Elizabeth R.”

That was the Queen’s first tweet – sent through the @BritishMonarchy account – heralding the launch of a major new exhibition at London’s Science Museum.

Three years in the planning, the exhibition is one of the most ambitious projects the museum has undertaken.

The Information Age gallery, opened by the Queen this morning, takes visitors on a journey through the history of modern communications from the telegraph to the smartphone.

There is the first transatlantic telegraph cable which connected Europe and North America, the broadcast equipment behind the BBC’s first radio programme in 1922, and Sir Tim Berners-Lee’s NeXT computer, which hosted the first website.

The gallery’s chief curator Tilly Blyth hopes that visitors who may be somewhat blase about the digital revolution will come away with a longer view.

“We really want them to see that our predecessors lived through similar periods of change. Ours isn’t the only revolution – just the latest. in a series of transformations since the electric telegraph in the 1830s.”

You can construct a 1980s mobile phone network, making sure your cell towers are efficiently positioned. You can go into the web story box to find out exactly what happens when you click on a link. And you can plug headphones into a 1950s telephone exchange, and listen to the operators describing what their work involved.

Baroness Lane-Fox, who has campaigned for better access to and understanding of the internet, welcomes the new gallery: “It’s an amazing opportunity for people young and old to come and see the extraordinary developments in technology over the last hundred years or so. It really reminds me of the scale of ambition that people have had to change things.”

She hopes too that visitors will learn of the great contribution made by Britain to the development of communications – from Ada Lovelace, the woman who conceived the idea of computer programming in the 1830s, through to the 1950s when Lyons Corner Houses introduced the first business computer Leo, and on to Sir Tim Berners-Lee: “I hope that people who visit will have their ambition and excitement lit so we can continue to be world leaders in this field because it’s so important.”

The gallery certainly does show off the role Britain has played, and a number of British companies including BT and the chip designer ARM Holdings have sponsored the Information Age and supplied exhibits.

Microsoft profits from cloud services

April 25, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Cloud Computing, Computers, Microsoft, Technology Companies, Uncategorized

Microsoft has announced a increase in it’s profits- grown by increased use of cloud services.

Microsoft profits from cloud servicesMicrosoft earnings were buoyed by new CEO Satya Nadella’s cloud vision as these earnings are the first Microsoft has released with new chief executive in charge.

Microsoft reported net profits of £3.37 billion in the first quarter of 2014- which was better than finance markets had estimated.

The software maker’s efforts to move further into cloud computing – a move championed by new chief executive Satya Nadella – seem to be paying off.

Azure, a cloud computing product, saw revenue grow 150%, Microsoft.

The company also said it added 1 million users to its subscription-based Office programme for personal users.

Microsoft sold in 2 million Xbox consoles, including 1.2 million Xbox Ones during the period.

“We are making good progress in our consumer services like Bing and Office 365 Home, and our commercial customers continue to embrace our cloud solutions,” said chief executive Satya Nadella, who replaced Steve Ballmer in February.

However, Microsoft was hurt by declining personal computer sales, as users continue to shift to other technologies.

Overall, profits declined by 6.5% compared to the same period last year.

Microsoft shares rose close to 3% in after-hours trading.

Black market for stolen smartphones grows

April 22, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: mobile phones, smart phones, Technology Companies, Telecommunications Companies, Uncategorized

A black market of shops and traders willing to deal in stolen smartphones has been exposed.

Black market for stolen smartphones growsMore than 30,000 phones have been stolen in London alone in 2014.

They were then all blocked or reported stolen to the networks

All the phones used had ‘find-my-phone’ style blocks activated, and in theory their IMEI numbers mean they are not useable once reported stolen.

But it is simple it was to get around such features – using only a laptop.

By giving a device a new IMEI number – effectively changing the phone’s fingerprint – it means that the phone could be used as normal again.

And restoring the phone’s default software removes “find-my-phone” protection.

In just a few mouse clicks and the phone is turned from a paperweight back to a useable device again.

Over the past 12 months:

  • 30,430 phones taken in thefts – down 12% on previous year
  • 13,724 phones taken in robberies
  • Equivalent to 80 phones a day being taken
  • More than half of all the thefts on the Tube are of mobile phones

Source: Metropolitan Police and British Transport Police

A phone stolen this morning could be back on the streets by this afternoon, packaged up as a second hand legitimate phone.

A fundamental redesign of smartphones to place the IMEI number on a ‘read-only’ part of the device would prevent this. But Mr Roughley said manufacturers have been reluctant to do this.

So beware you so called smart phone- isn’t that clever if it is lost or stolen.

Police warn on cyber crime threats

April 18, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Cyber Security, data security, Hackers, Personal Security, Search Clinic, Telecommunications Companies, Uncategorized

Only three out of 43 police forces in England and Wales have a comprehensive plan to deal with a large scale cyber attack, new research has found.

Police warn on cyber crime threatsHer Majesty’s Inspectorate of Constabulary (HMIC) warned only Derbyshire, Lincolnshire and West Midlands had sufficient plans in place.

It also found only 2% of police staff across 37 forces had been trained on investigating cybercrime.

The report examined how prepared police are for a series of national threats.

Last year, the government identified five threats as priorities for police to prepare for. These are:

  • Terrorism
  • Civil emergencies
  • Organised crime
  • Public order threats
  • Large-scale cyber-attacks

As part of its Strategic Policing Requirement (SPR), the Home Office called for a nationally required policing response to counter each of the threats.

The report is the first in a series of inspections looking at how individual forces have responded to the guidelines.

HMIC inspectors said they were “struck by how incomplete the police service’s understanding of the national threats was” and that more needs to be done “collectively by all forces”.

The report called for “much greater attention” from police leaders.

“The capacity and capability of the police to respond to national threats is stronger in some areas than others – with the police response to the cyber-threat being the least well developed,” HMIC’s Stephen Otter said.

Police plans to deal with counter-terrorism, public order, civil emergencies and organised crime were in “stark contrast” with the capabilities for cyber-related threats.

Inspectors found the ability to deal with cyber-threats remains “largely absent” in some forces and that some senior officers across England and Wales are still “unsure of what constituted a large-scale cyber-incident”.

They found forces were “silent” when it came to preventing cybercrime and protecting people from the harm it causes, despite the fact it is “fast becoming a dominant method in the perpetration of crime.

“The police must be able to operate very soon just as well in cyberspace as they do on the street,” the report said.

According to the government’s definition, a large-scale cyber-incident could be “a criminal attack on a financial institution to gather data or money” or an “aggregated threat where many people or businesses across the UK are targeted”.

It also includes “the response to a failure of technology on which communities depend and which may also be considered a civil emergency”.

Basically- despite cybercrime costing the UK ecomony billions of Pounds, our plods are light years from being able to cope- let alone help us.

Moral of the story is make sure that you are as secure as you can be- because the state isn’t capable of nannying you.

Passwords- how to set and remember them

April 15, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Cyber Security, data security, Dr Search, Hackers, Personal Security, Search Clinic, Uncategorized

With the heightened risk of password hacking Search Clinic thought that it is a good time to refresh your memory on how to set- and remember your secure passwords.

Passwords- how to set and remember themDr Search of the Search Clinic visited the Cheltenham Science Festival a few years ago and attended a lecture by Toby of GCHQ on security in the computer age and posted a post at: top common passwords.

Your starter for ten is to make sure that you don’t use any of them. If you do- then you are already in trouble.

Changing passwords is something many people avoid at all costs- because they fear they will forget the new password.

However, you can make something memorable by simply using the power of association and location. In order to remember a string of online passwords, all you have to do is associate each individual letter and number with a known or fixed item, calling on your imagination throughout.

The more you stimulate and use your imagination, the more connections you will be able to make, and the more you will be able to memorise.

Memory expert Tony Buzan gives tips on how to remember new ones, which should be a long jumble of randomly generated letters and numbers.

No pet’s names- Hackers can find out a lot about you from social media

No dictionary words- Hackers can precalculate the encrypted forms of whole dictionaries and easily reverse engineer your password.

Mix unusual characters- Try a word or phrase where characters are substituted -Whyd03s1talw&ysr*in?

Have multiple passwords- If hackers compromise one system, they won’t be able to access other accounts.

Keep them safely- Don’t write them down – use a secure password vault on your phone. If you must worte them down label the file someother OTHER than passwords.

Tom from GCHQ suggested using a combination of the above, by using multiple words and numbers- with a few symbols thrown in for good measure:

wh1te-rabbt)*m0nth

Good Luck- and safe browsing.

Heartbleed bug- what you need to know

April 11, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Cyber Security, data security, Dr Search, Hackers, Search Clinic, Uncategorized

A major security flaw at the heart of the internet may have been exposing users’ personal information and passwords to hackers for the past two years.

Heartbleed bug- what you need to knowThe Heartbleed bug exists in a piece of open source software called OpenSSL which is designed to encrypt communications between a user’s computer and a web server, a sort of secret handshake at the beginning of a secure conversation.

It was dubbed Heartbleed because it affects an extension to SSL (Secure Sockets Layer) which engineers dubbed Heartbeat.

It is one of the most widely used encryption tools on the internet, believed to be deployed by roughly two-thirds of all websites. If you see a little padlock symbol in your browser then it is likely that you are using SSL.

Half a million sites are thought to have been affected.

In his blog chief technology officer of Co3 Systems Bruce Schneier said: “The Heartbleed bug allows anyone to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the name and passwords of the users and the actual content,” he said.

“This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users,” he added.

The bug is so serious it has its own website Heartbleed.com which outlines all aspects of the problem.

Some security experts are saying that it would be prudent to change your passwords- although there is a degree of confusion as to when and if this needs to be done.

Some point out that there will be plenty of smaller sites that haven’t yet dealt with the issue and with these a password reset could do more harm than good, revealing both old and new passwords to any would-be attacker.

But now the bug is widely known even smaller sites will issue patches soon so most people should probably start thinking about resetting their passwords.

The exploit was not related to weak passwords but now there are calls for a mass reset of existing ones, many are reiterating the need to make sure they are as secure as possible.

There are half a million websites believed to be vulnerable so too many to list but there is a glut of new sites offering users the chance to check whether the online haunts they use regularly are affected.

The bad news, according to a blog from security firm Kaspersky is that “exploiting Heartbleed leaves no traces so there is no definitive way to tell if the server was hacked and what kind of data was stolen”.

Security experts say that they are starting to see evidence that hacker groups are conducting automated scans of the internet in search of web servers using OpenSSL.

And Kaspersky said that it had uncovered evidence that groups believed to be involved in state-sponsored cyber-espionage were running such scans shortly after news of the bug broke.

Search Clinic will soon post a blog on how to set and remember passwords- so please subscribe to the Search Clinic newsfeed.

New Twitter popularity chart launched

March 31, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Customer Service, internet, Search Clinic, Social Media, Twitter, Uncategorized

The music Billboard organisation has announced a new set of music charts based on Twitter data.
New Twitter popularity chart launchedWorking with the social media platform, the Billboard Twitter Real-Time Charts will rank tracks and artists based on Twitter traffic.

Trends will be ranked in real-time over extended periods of time to track the longevity of successful songs and artists’ popularity.

The charts will also highlight the most talked about and shared tracks by new and upcoming acts.

The Twitter Real-Time Charts are set to launch in America over the next fortnight.

Bob Moczydlowsky, Twitter’s head of music, said: “When artists share songs and engage with their audience on Twitter, the buzz they create will now be visible to fans, other musicians and industry decision makers in real-time.”

Katy Perry is currently the most followed musician of Twitter with 51.8 million followers.

Official accounts of Justin Bieber, Lady Gaga, Taylor Swift, Britney Spears, Rihanna and Justin Timberlake are also in the top 10 most followed users on the site.

Billboard’s Hot 100 chart, which is based on radio play, streaming online, and sales, was recently expanded to include Spotify and YouTube streams.

They also launched an artist chart called Social 50 in 2010, which collects data from social media.

The new chart will be available on Billboard.com and will be shared on their Twitter account @billboard.

Dangers of constantly on wifi smartphone apps

March 28, 2014 By: Dr Search Principal Consultant at the Search Clinic Category: Apps, Cyber Security, data security, Hackers, mobile phones, Personal Security, Search Clinic, smart phones, Technology Companies, Uncategorized, WiFi

The dangers of constantly keeping your smartphone’s always on has been revealed.

Dangers of constantly on wifi smartphone appsMany smartphone users leave the wireless option constantly turned on on their smartphone. That means the phones are constantly looking for a network to join – including previously used networks.

Once the user has joined a disguised wifi network, the rogue operator can then steal any information that the user enters while on that network – including email passwords, Facebook account information, and even banking details.

This is also why smartphones and other devices that use wireless technology – such as Oyster cards using RFID (radio frequency identification) or bank cards with chips – can betray their users.

Mr Wilkinson – who began developing the Snoopy software three years ago as a side-project – gave the BBC a preview of the technology ahead of its release.

Pulling out a laptop from his bag, Mr Wilkinson opened the Snoopy programme – and immediately pulled up the smartphone information of hundreds of Black Hat conference attendees.

With just a few keystrokes, he showed that an attendee sitting in the back right corner of the keynote speech probably lived in a specific neighbourhood in Singapore. The software even provided a streetview photo of the smartphone user’s presumed address.
DJI phantom SensePost has used the Snoopy software attached to cheap commercial drones like DJI’s Phantom

Drones- not just flying cameras:

  •     Drones are controlled either autonomously by on-board computers, or by remote control
  •     They are used in situations where manned flight is considered too dangerous or difficult
  •     Also increasingly used for policing and fire-fighting, security work, and for filming

For instance, the Snoopy software has been ground-based until now, operating primarily on computers, smartphones with Linux installed on them, and on open-source small computers like the Raspberry Pi and BeagleBone Black.

But when attached to a drone, it can quickly cover large areas.

“You can also fly out of audio-visual range – so you can’t see or hear it, meaning you can bypass physical security – men with guns, that sort of thing,” he says.

It’s not hard to imagine a scenario in which an authoritarian regime could fly the drone over an anti-government protest and collect the smartphone data of every protester and use the data to figure out the identities of everyone in attendance.

Mr Wilkinson says that this is why he has become fascinated with our “digital terrestrial footprint” – and the way our devices can betray us.

He says he wants to “talk about this to bring awareness” of the security risks posed by such simple technologies to users.

His advice? Turn off the wireless network on your phone until you absolutely need to use it.